White Paper: DLP - Data Loss/Leak Prevention
2026: Inclusion in the Unified Register of Russian Software
CICADA8 January 22, 2026, it announced that information about the CyberRating CICADA8 system for assessing the level of security of contractors and subsidiaries has been entered into the Unified Register of Russian Software.
Entry into the Unified Register of Russian Software is an official confirmation of the domestic development of the system and compliance with the requirements. Ministry of Digital Development of Russia Organizations public sector and other areas leading the process import substitution ON can now use CyberRating CICADA8 to reduce cyber risks associated with the attacks supply chain.
CyberRating CICADA8 is a system for assessing the level of security of contractors and subsidiaries. It takes into account a large range of criteria and on the basis of non-invasive analysis forms a cumulative rating information security of organizations, which is updated in real time. The rating is assigned based on an independent assessment of organizations in three areas: availability vulnerabilities on the - IT perimeter (Vulnerability Rating), reputation of assets located on the external perimeter (Network Rating), and identification of facts leaks databases associated with this company (Leaks Rating).
| With the entry of information into the Unified Register of Russian software CICADA8 CyberRating can be used in organizations that are obliged to use only [domestic software]. The solution will help them monitor the security of the entire network of counterparties and subsidiaries, identify shortcomings in protection and prioritize measures to eliminate them. In addition, the level of security can now become an additional factor in the choice of contractors in the public sector, "said Sergey Kolesnikov, technical director of the CICADA8. |
The CICADA8 CyberRating system is one of the modules of the Cicada8 Platform, which, thanks to the service of centralized management of vulnerabilities of the external and internal perimeters and tracking cyber threats in real time. allows you to implement an integrated approach to reducing digital risks. Within the framework of the Platform, customers have tools to control vulnerabilities, identify phishing brand sites, detect source code leaks, corporate data and intellectual property, and mention cyber security company incidents in,, and MEDIA. social networks Darknet
